blob: f981f160802b14e4aef9281315f5d74297f5b3d9 [file] [log] [blame]
Tony Mackce4e2c22015-01-06 23:48:02 -05001import os
2import base64
3from collections import defaultdict
4from django.db.models import F, Q
5from planetstack.config import Config
6from observer.openstacksyncstep import OpenStackSyncStep
7from core.models.slice import Controller, SlicePrivilege
8from core.models.user import User
9from core.models.controlleruser import ControllerUser, ControllerSlicePrivilege
10from util.logger import Logger, logging
11
12from observer.ansible import *
13
14logger = Logger(level=logging.INFO)
15
16class SyncControllerSlicePrivileges(OpenStackSyncStep):
17 provides=[ControllerSlicePrivilege]
18 requested_interval=0
19
20 def fetch_pending(self, deleted):
21
22 if (deleted):
23 return ControllerSlicePrivilege.deleted_objects.all()
24 else:
25 return ControllerSlicePrivilege.objects.filter(Q(enacted__lt=F('updated')) | Q(enacted=None))
26
27 def sync_record(self, controller_slice_privilege):
28 logger.info("sync'ing controler_slice_privilege %s at controller %s" % (controller_slice_privilege, controller_slice_privilege.controller))
29
30 if not controller_slice_privilege.controller.admin_user:
31 logger.info("controller %r has no admin_user, skipping" % controller_slice_privilege.controller)
32 return
33
34 template = os_template_env.get_template('sync_controller_users.yaml')
35 roles = [controller_slice_privilege.slice_privilege.role.role]
36 # setup user home slice roles at controller
37 if not controller_slice_privilege.slice_privilege.user.site:
38 raise Exception('Sliceless user %s'%controller_slice_privilege.slice_privilege.user.email)
39 else:
40 # look up tenant id for the user's slice at the controller
41 #ctrl_slice_deployments = SliceDeployment.objects.filter(
42 # slice_deployment__slice=controller_slice_privilege.user.slice,
43 # controller=controller_slice_privilege.controller)
44
45 #if ctrl_slice_deployments:
46 # # need the correct tenant id for slice at the controller
47 # tenant_id = ctrl_slice_deployments[0].tenant_id
48 # tenant_name = ctrl_slice_deployments[0].slice_deployment.slice.login_base
49 user_fields = {
50 'endpoint':controller_slice_privilege.controller.auth_url,
51 'name': controller_slice_privilege.slice_privilege.user.email,
52 'email': controller_slice_privilege.slice_privilege.user.email,
53 'password': controller_slice_privilege.slice_privilege.user.remote_password,
54 'admin_user': controller_slice_privilege.controller.admin_user,
55 'admin_password': controller_slice_privilege.controller.admin_password,
56 'ansible_tag':'%s@%s'%(controller_slice_privilege.slice_privilege.user.email.replace('@','-at-'),controller_slice_privilege.controller.name),
57 'admin_tenant': controller_slice_privilege.controller.admin_tenant,
58 'roles':roles,
59 'tenant':controller_slice_privilege.slice_privilege.slice.name}
60
61 rendered = template.render(user_fields)
62 res = run_template('sync_controller_users.yaml', user_fields,path='controller_slice_privileges')
63
64 # results is an array in which each element corresponds to an
65 # "ok" string received per operation. If we get as many oks as
66 # the number of operations we issued, that means a grand success.
67 # Otherwise, the number of oks tell us which operation failed.
68 expected_length = len(roles) + 1
69 if (len(res)==expected_length):
70 controller_slice_privilege.role_id = res[0]['id']
71 controller_slice_privilege.save()
72 elif (len(res)):
73 raise Exception('Could not assign roles for user %s'%user_fields['name'])
74 else:
75 raise Exception('Could not create or update user %s'%user_fields['name'])
76
77 def delete_record(self, controller_slice_privilege):
78 if controller_slice_privilege.role_id:
79 driver = self.driver.admin_driver(controller=controller_slice_privilege.controller)
80 user = ControllerUser.objects.get(
81 controller=controller_slice_privilege.controller,
82 user=controller_slice_privilege.slice_privilege.user
83 )
84 slice = ControllerSlice.objects.get(
85 controller=controller_slice_privilege.controller,
86 user=controller_slice_privilege.slice_privilege.user
87 )
88 driver.delete_user_role(
89 user.kuser_id,
90 slice.tenant_id,
91 controller_slice_privilege.slice_prvilege.role.role
92 )